Impact
The MxGeneralIo utility for Moxa’s industrial x86 computers exposes IOCTL interfaces that allow direct read and write access to MSR registers and system memory without sufficient access control. A local attacker who already has high privileges can exploit these interfaces to read sensitive data, modify memory, and perform unauthorized operations. Successful exploitation can result in privilege escalation on Windows 7 systems or trigger a system crash (BSOD) on Windows 10 and Windows 11, effectively causing a denial‑of‑service condition. The flaw may also slightly affect the confidentiality and integrity of the device, although no further impact downstream has been identified.
Affected Systems
Affected systems include any installation of the MxGeneralIo utility on Moxa x86 industrial computers running Windows 7 (both x86 and x64), Windows 10, or Windows 11. The CVE entry does not list specific utility versions, so any version of the utility on those platforms is potentially vulnerable.
Risk and Exploitability
The CVSS score of 7.0 indicates a medium to high severity. Exploitation requires local access with high privileges, so the likelihood of attack in the wild may be limited. EPSS data is not available, but the vulnerability is not listed in the CISA KEV catalog. Because a successful exploit can lead to a system crash on newer Windows editions and produce privilege escalation on Windows 7, the potential impact on availability and security remains significant. Administrators should treat this issue as a priority for patching.
OpenCVE Enrichment